Attackers are hiding interesting malware in a boring place, hoping victims won’t bother to look. Where’s the last place you’d expect to find malware? In an email from your mother? Embedded in software ...
Our guide explains all you need to know about identity theft, including what it is, how to prevent it, and what to do if ...
Before you download, open, or share files from the internet, you need to be sure they’re safe. And how do you do that? I simply use a file scanner to check for known threats like malware, viruses, and ...
A new malicious campaign is spreading LokiBot and NanoCore trojans under the guise of an ISO file claiming to be an invoice. An ongoing spam campaign has been spotted using ISO disk image file ...
People who have fallen victim to FortuneCrypt, Yatron, WannaCryFake or Avest ransomware should now be able to retrieve their encrypted files without giving into the extortion demands of cyber ...
ZIP and RAR files have overtaken Office documents as the file most commonly used by cyber criminals to deliver malware, according to an analysis of real-world cyber attacks and data collected from ...
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine ...